- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
Information Gathering & OSINT Methodology | Penetration Testing Full Guide
In this video, you will learn Information Gathering & Open Source Intelligence (OSINT) step-by-step as part of NVHPT Module 02 – Penetration Testing.
Information Gathering is the most critical phase in ethical hacking. The more intelligence you collect, the easier it becomes to identify vulnerabilities and attack surfaces.
This complete 36-minute session covers:
✔ Types of Information
✔ Human Intelligence Collection
✔ Website & Domain Intelligence
✔ Computer & Network Enumeration
✔ Domain & Subdomain Enumeration
✔ OSINT using DNS, Shodan & Search Engines
✔ Email Harvesting
✔ Social Media Intelligence
✔ Network Mapping & Automation
If you're serious about becoming an Ethical Hacker, this module is mandatory.
Timestamps
00:00 – Introduction to Module 02
01:18 – What is Information?
02:40 – Types of Information (Public, Private, Sensitive)
04:15 – Human Information (Personal Data)
06:10 – Social & Behavioral Intelligence
08:05 – Professional & Financial Information
10:12 – Website Information (Domain & Hosting Details)
12:25 – Technology Information (Server, CMS, Frameworks)
14:40 – Website Content & Metadata Analysis
16:55 – Computer System Information
18:50 – Network Information (Ports, IP, MAC, Services)
20:35 – User & Software Information
22:10 – OSINT Using WWW
23:45 – Domain & Subdomain Enumeration
25:40 – Footprinting Using Shodan
27:10 – Geolocation & Street View Intelligence
28:45 – Email Harvesting Techniques
30:15 – Social Media OSINT & Fake Profiles
32:10 – DNS Interrogation
33:30 – Network Mapping
35:00 – OSINT Automation & Diagrams
36:00 – Conclusion
Why This Video is Important?
Information Gathering helps you:
• Identify attack surface
• Detect hidden applications
• Discover exposed services
• Map organization infrastructure
• Build a complete intelligence profile
This is the foundation of:
✔ Ethical Hacking
✔ Penetration Testing
✔ Bug Bounty
✔ Red Teaming
✔ Cyber Crime Investigation
🎯 Who Should Watch?
• Ethical Hacking Students
• Bug Bounty Hunters
• Cyber Crime Investigators
• SOC Analysts
• Beginners in Cybersecurity
👉 Become a Computer Forensic | Cyber Forensic | Digital Forensic Expert in 90 Days with 90+ Live Classes!
🟢 WhatsApp for Classes: +91 9284388805
🔵 Check Modules: [View Modules] (https://drive.google.com/file/d/1f8Twp2XBrpMJCtm5EX5ynzWQtTQXbbm-/view?usp=sharing )
---------------------------------------------------------------------------------------------------------------------------------------------------------------
🔒 Expert-Level Ethical Hacking: 120-Day Training🔒
👉 Become an Advanced Ethical Hacker with Live Classes, 60+ Modules, and many Live Projects with NewVersionHacker!
🟢WhatsApp for Classes: +91 9284388805
🔵Check Modules: [View Modules](https://drive.google.com/file/d/16sEpBe2VHHlprhBBMdbkGM3hszNxbLyM/view?usp=drive_link)
---------------------------------------------------------------------------------------------------------------------------------------------------------------
🔴 Disclaimer 🔴
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. NewVersionHacker is not responsible for any misuse of the provided information.
FOLLOW US :
https://www.facebook.com/newversionhacker
https://www.instagram.com/newversionhacker
https://www.linkedin.com/company/newversionhacker
https://t.me/newversionhacker
WhatsApp Channel :https://whatsapp.com/channel/0029Vaf2TAPC6ZvqEAyxYP28
Видео Information Gathering & OSINT Methodology | Penetration Testing Full Guide канала NewVersionHacker | New Version Hacker
Information Gathering is the most critical phase in ethical hacking. The more intelligence you collect, the easier it becomes to identify vulnerabilities and attack surfaces.
This complete 36-minute session covers:
✔ Types of Information
✔ Human Intelligence Collection
✔ Website & Domain Intelligence
✔ Computer & Network Enumeration
✔ Domain & Subdomain Enumeration
✔ OSINT using DNS, Shodan & Search Engines
✔ Email Harvesting
✔ Social Media Intelligence
✔ Network Mapping & Automation
If you're serious about becoming an Ethical Hacker, this module is mandatory.
Timestamps
00:00 – Introduction to Module 02
01:18 – What is Information?
02:40 – Types of Information (Public, Private, Sensitive)
04:15 – Human Information (Personal Data)
06:10 – Social & Behavioral Intelligence
08:05 – Professional & Financial Information
10:12 – Website Information (Domain & Hosting Details)
12:25 – Technology Information (Server, CMS, Frameworks)
14:40 – Website Content & Metadata Analysis
16:55 – Computer System Information
18:50 – Network Information (Ports, IP, MAC, Services)
20:35 – User & Software Information
22:10 – OSINT Using WWW
23:45 – Domain & Subdomain Enumeration
25:40 – Footprinting Using Shodan
27:10 – Geolocation & Street View Intelligence
28:45 – Email Harvesting Techniques
30:15 – Social Media OSINT & Fake Profiles
32:10 – DNS Interrogation
33:30 – Network Mapping
35:00 – OSINT Automation & Diagrams
36:00 – Conclusion
Why This Video is Important?
Information Gathering helps you:
• Identify attack surface
• Detect hidden applications
• Discover exposed services
• Map organization infrastructure
• Build a complete intelligence profile
This is the foundation of:
✔ Ethical Hacking
✔ Penetration Testing
✔ Bug Bounty
✔ Red Teaming
✔ Cyber Crime Investigation
🎯 Who Should Watch?
• Ethical Hacking Students
• Bug Bounty Hunters
• Cyber Crime Investigators
• SOC Analysts
• Beginners in Cybersecurity
👉 Become a Computer Forensic | Cyber Forensic | Digital Forensic Expert in 90 Days with 90+ Live Classes!
🟢 WhatsApp for Classes: +91 9284388805
🔵 Check Modules: [View Modules] (https://drive.google.com/file/d/1f8Twp2XBrpMJCtm5EX5ynzWQtTQXbbm-/view?usp=sharing )
---------------------------------------------------------------------------------------------------------------------------------------------------------------
🔒 Expert-Level Ethical Hacking: 120-Day Training🔒
👉 Become an Advanced Ethical Hacker with Live Classes, 60+ Modules, and many Live Projects with NewVersionHacker!
🟢WhatsApp for Classes: +91 9284388805
🔵Check Modules: [View Modules](https://drive.google.com/file/d/16sEpBe2VHHlprhBBMdbkGM3hszNxbLyM/view?usp=drive_link)
---------------------------------------------------------------------------------------------------------------------------------------------------------------
🔴 Disclaimer 🔴
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. NewVersionHacker is not responsible for any misuse of the provided information.
FOLLOW US :
https://www.facebook.com/newversionhacker
https://www.instagram.com/newversionhacker
https://www.linkedin.com/company/newversionhacker
https://t.me/newversionhacker
WhatsApp Channel :https://whatsapp.com/channel/0029Vaf2TAPC6ZvqEAyxYP28
Видео Information Gathering & OSINT Methodology | Penetration Testing Full Guide канала NewVersionHacker | New Version Hacker
newversionhacker hindi new version hacker information gathering osint tutorial penetration testing tutorial osint full course ethical hacking course footprinting and reconnaissance osint tools cyber security course ethical hacking for beginners osint ethical hacking cyber security penetration testing bug bounty kali linux reconnaissance cyber security training hacking tutorial osint tools free open source intelligence cyber security roadmap
Комментарии отсутствуют
Информация о видео
15 мая 2026 г. 17:45:06
00:36:30
Другие видео канала





















